The sign is seen above the headquarters of Kaspersky Lab in Moscow Monday, on Jan. 30, 2017. Pavel Golovkin/AP/AP hide caption
cybersecurity
Austin's Ascension Seton Medical Center is among the hospitals affected by a nationwide cybersecurity breach of Ascension technology systems. Julia Reihs/KUT News hide caption
People stand in line to withdraw money from an ATM of Alfa Bank in Moscow last year. Victor Berzkin/AP hide caption
A signage of Microsoft is seen on March 13, 2020 in New York City. The U.S. government and Microsoft recently revealed that Chinese hackers broke in to online email systems and stole some unclassified information. Jeenah Moon/Getty Images hide caption
Matt Ashley, a senior technologist at Johnson Memorial Health in Franklin, Indiana, is part of a small IT team that spent months helping the hospital recover after a crippling cyberattack in 2021. Farah Yousry/WFYI hide caption
Cyberattacks on health care are increasing. Inside one hospital's fight to recover
Side Effects Public Media
Servers at the All India Institute of Medical Sciences in New Delhi are still not back to normal two weeks after they were hacked and the data was held for ransom. Amal KS/Hindustan Times via Getty Images hide caption
Peiter Zatko, known by his hacker name "Mudge," talks about cybersecurity with the Senate Governmental Affairs committee on May 19, 1998. He's scheduled to testify again about his whistleblower complaint against Twitter on Sept. 13, 2022. (Photo by Douglas Graham/Congressional Quarterly/Getty Images) Douglas Graham/CQ-Roll Call, Inc via Getty Images hide caption
Harri Hursti told NPR he's been instructed not to open the box containing the Dominion ImageCast X machine that he bought on eBay for $1,200. Harri Hursti hide caption
Tesla CEO Elon Musk's legal team argues that allegations by Twitter's ex-security chief give him reason to pull out of his agreement to buy the Twitter. Here, Musk speaks at a meeting of energy, oil and gas executives in Norway on August 29. CARINA JOHANSEN/NTB/AFP via Getty Images hide caption
Elon Musk wants to get out of buying Twitter. A whistleblower's claims might help him
Peiter Zatko, Twitter's former security head, poses for a portrait on Aug. 22 in Washington, D.C. Zatko accused the company of ignoring major security vulnerabilities in an explosive whistleblower complaint. Matt McClain/The Washington Post via Getty Images hide caption
People shop at an Apple Store in Beijing on Sept. 28, 2021. Apple has disclosed serious security vulnerabilities for iPhones, iPads and Macs that could potentially allow attackers to take complete control of these devices. Andy Wong/AP hide caption
Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly testifies before a House Homeland Security Subcommittee, at the Rayburn House Office Building on April 28 in Washington, D.C. Kevin Dietsch/Getty Images hide caption
Service members of the 126th Separate Territorial Brigade of the Armed Forces of Ukraine take part in military exercises in the Odesa region on Wednesday. Oleksandr Gimanov/AFP via Getty Images hide caption
Professor Rain Ottis leads a Locked Shield Excercise at Hilton Tallinn Park. Nora Lorek for NPR hide caption
A flag of the International Committee of the Red Cross flutters above the humanitarian organization's headquarters in Geneva on Sept. 29, 2021. The ICRC is pleading with hackers to keep stolen data confidential. Fabrice Coffrini/AFP via Getty Images hide caption
A researcher recently found a vulnerability in a piece of software called Log4j, which is used in the programming language Java and essentially creates a log of activity that can enable a hacker to take over a device. Christopher Schirner/Flickr hide caption
Companies scramble to defend against newly discovered 'Log4j' digital flaw
A virtual conference hosted by the White House includes 'like-minded' nations that are all facing challenges with ransomware. Busà Photography/Getty Images hide caption
Fuel holding tanks are pictured at Colonial Pipeline's Dorsey Junction Station in Woodbine, Maryland in May 2021, the month that a cyberattack disrupted gas supply to the eastern U.S. for several days. Drew Angerer/Getty Images hide caption
An alert on a suspected attack by state-backed Chinese hackers from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency in April. Jon Elswick/AP hide caption
This Feb 23, 2019, file photo shows the inside of a computer. A ransomware attack paralyzed the networks of at least 200 U.S. companies, according to a cybersecurity researcher whose company was responding to the incident. Jenny Kane/AP hide caption
FireEye CEO Kevin Mandia, SolarWinds CEO Sudhakar Ramakrishna and Microsoft President Brad Smith testify during a Senate Intelligence Committee hearing on Capitol Hill on Feb. 23, in Washington, D.C. The hearing focused on the 2020 cyberattack that resulted in a series of data breaches within several agencies and departments in the U.S. federal government. Drew Angerer/Getty Images hide caption
Hackers used the U.S. Agency for International Development's email marketing account to send messages that looked legitimate — but links in the email exposed recipients to malicious software, Microsoft says. Screen grab by Microsoft hide caption
A gas pump is marked "out of service" as cars line up May 11 at a Circle K in Charlotte, N.C., following a ransomware attack that shut down Colonial Pipeline. Logan Cyrus/AFP via Getty Images hide caption
Pipeline Companies Will Have To Report Cyberattacks To The Government
The shutdown of the Colonial Pipeline following a cyberattack is prompting speculation about what could happen to gasoline and diesel prices ahead of Memorial Day. Rick Bowmer/AP hide caption